aboutsummaryrefslogtreecommitdiffstats
path: root/tools/testing/selftests/bpf/test_tcpbpf_kern.c
diff options
context:
space:
mode:
authorJiong Wang <jiong.wang@netronome.com>2019-02-11 12:01:20 +0000
committerAlexei Starovoitov <ast@kernel.org>2019-02-11 20:31:38 -0800
commitbd4aed0ee73ca873bef3cb3ec746dd796f03df28 (patch)
tree1dcd4de735f8ca3dbf672dc5d48d064ea1dea5dc /tools/testing/selftests/bpf/test_tcpbpf_kern.c
parentselftests: bpf: extend sub-register mode compilation to all bpf object files (diff)
downloadlinux-dev-bd4aed0ee73ca873bef3cb3ec746dd796f03df28.tar.xz
linux-dev-bd4aed0ee73ca873bef3cb3ec746dd796f03df28.zip
selftests: bpf: centre kernel bpf objects under new subdir "progs"
At the moment, all kernel bpf objects are listed under BPF_OBJ_FILES. Listing them manually sometimes causing patch conflict when people are adding new testcases simultaneously. It is better to centre all the related source files under a subdir "progs", then auto-generate the object file list. Suggested-by: Alexei Starovoitov <ast@kernel.org> Reviewed-by: Jakub Kicinski <jakub.kicinski@netronome.com> Signed-off-by: Jiong Wang <jiong.wang@netronome.com> Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'tools/testing/selftests/bpf/test_tcpbpf_kern.c')
-rw-r--r--tools/testing/selftests/bpf/test_tcpbpf_kern.c153
1 files changed, 0 insertions, 153 deletions
diff --git a/tools/testing/selftests/bpf/test_tcpbpf_kern.c b/tools/testing/selftests/bpf/test_tcpbpf_kern.c
deleted file mode 100644
index 74f73b33a7b0..000000000000
--- a/tools/testing/selftests/bpf/test_tcpbpf_kern.c
+++ /dev/null
@@ -1,153 +0,0 @@
-// SPDX-License-Identifier: GPL-2.0
-#include <stddef.h>
-#include <string.h>
-#include <linux/bpf.h>
-#include <linux/if_ether.h>
-#include <linux/if_packet.h>
-#include <linux/ip.h>
-#include <linux/ipv6.h>
-#include <linux/types.h>
-#include <linux/socket.h>
-#include <linux/tcp.h>
-#include <netinet/in.h>
-#include "bpf_helpers.h"
-#include "bpf_endian.h"
-#include "test_tcpbpf.h"
-
-struct bpf_map_def SEC("maps") global_map = {
- .type = BPF_MAP_TYPE_ARRAY,
- .key_size = sizeof(__u32),
- .value_size = sizeof(struct tcpbpf_globals),
- .max_entries = 4,
-};
-
-struct bpf_map_def SEC("maps") sockopt_results = {
- .type = BPF_MAP_TYPE_ARRAY,
- .key_size = sizeof(__u32),
- .value_size = sizeof(int),
- .max_entries = 2,
-};
-
-static inline void update_event_map(int event)
-{
- __u32 key = 0;
- struct tcpbpf_globals g, *gp;
-
- gp = bpf_map_lookup_elem(&global_map, &key);
- if (gp == NULL) {
- struct tcpbpf_globals g = {0};
-
- g.event_map |= (1 << event);
- bpf_map_update_elem(&global_map, &key, &g,
- BPF_ANY);
- } else {
- g = *gp;
- g.event_map |= (1 << event);
- bpf_map_update_elem(&global_map, &key, &g,
- BPF_ANY);
- }
-}
-
-int _version SEC("version") = 1;
-
-SEC("sockops")
-int bpf_testcb(struct bpf_sock_ops *skops)
-{
- char header[sizeof(struct ipv6hdr) + sizeof(struct tcphdr)];
- struct tcphdr *thdr;
- int good_call_rv = 0;
- int bad_call_rv = 0;
- int save_syn = 1;
- int rv = -1;
- int v = 0;
- int op;
-
- op = (int) skops->op;
-
- update_event_map(op);
-
- switch (op) {
- case BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB:
- /* Test failure to set largest cb flag (assumes not defined) */
- bad_call_rv = bpf_sock_ops_cb_flags_set(skops, 0x80);
- /* Set callback */
- good_call_rv = bpf_sock_ops_cb_flags_set(skops,
- BPF_SOCK_OPS_STATE_CB_FLAG);
- /* Update results */
- {
- __u32 key = 0;
- struct tcpbpf_globals g, *gp;
-
- gp = bpf_map_lookup_elem(&global_map, &key);
- if (!gp)
- break;
- g = *gp;
- g.bad_cb_test_rv = bad_call_rv;
- g.good_cb_test_rv = good_call_rv;
- bpf_map_update_elem(&global_map, &key, &g,
- BPF_ANY);
- }
- break;
- case BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB:
- skops->sk_txhash = 0x12345f;
- v = 0xff;
- rv = bpf_setsockopt(skops, SOL_IPV6, IPV6_TCLASS, &v,
- sizeof(v));
- if (skops->family == AF_INET6) {
- v = bpf_getsockopt(skops, IPPROTO_TCP, TCP_SAVED_SYN,
- header, (sizeof(struct ipv6hdr) +
- sizeof(struct tcphdr)));
- if (!v) {
- int offset = sizeof(struct ipv6hdr);
-
- thdr = (struct tcphdr *)(header + offset);
- v = thdr->syn;
- __u32 key = 1;
-
- bpf_map_update_elem(&sockopt_results, &key, &v,
- BPF_ANY);
- }
- }
- break;
- case BPF_SOCK_OPS_RTO_CB:
- break;
- case BPF_SOCK_OPS_RETRANS_CB:
- break;
- case BPF_SOCK_OPS_STATE_CB:
- if (skops->args[1] == BPF_TCP_CLOSE) {
- __u32 key = 0;
- struct tcpbpf_globals g, *gp;
-
- gp = bpf_map_lookup_elem(&global_map, &key);
- if (!gp)
- break;
- g = *gp;
- if (skops->args[0] == BPF_TCP_LISTEN) {
- g.num_listen++;
- } else {
- g.total_retrans = skops->total_retrans;
- g.data_segs_in = skops->data_segs_in;
- g.data_segs_out = skops->data_segs_out;
- g.bytes_received = skops->bytes_received;
- g.bytes_acked = skops->bytes_acked;
- }
- bpf_map_update_elem(&global_map, &key, &g,
- BPF_ANY);
- }
- break;
- case BPF_SOCK_OPS_TCP_LISTEN_CB:
- bpf_sock_ops_cb_flags_set(skops, BPF_SOCK_OPS_STATE_CB_FLAG);
- v = bpf_setsockopt(skops, IPPROTO_TCP, TCP_SAVE_SYN,
- &save_syn, sizeof(save_syn));
- /* Update global map w/ result of setsock opt */
- __u32 key = 0;
-
- bpf_map_update_elem(&sockopt_results, &key, &v, BPF_ANY);
- break;
- default:
- rv = -1;
- }
- skops->reply = rv;
- return 1;
-}
-char _license[] SEC("license") = "GPL";